COVID-19 contact tracing and privacy: studying opinion and preferences L Simko, R Calo, F Roesner, T Kohno arXiv preprint arXiv:2005.06056, 2020 | 94 | 2020 |
Computer security and privacy for refugees in the United States L Simko, A Lerner, S Ibtasam, F Roesner, T Kohno 2018 IEEE symposium on security and privacy (SP), 409-423, 2018 | 86 | 2018 |
COVID-19 contact tracing and privacy: A longitudinal study of public opinion L Simko, J Chang, M Jiang, R Calo, F Roesner, T Kohno Digital Threats: Research and Practice (DTRAP) 3 (3), 1-36, 2022 | 48 | 2022 |
Defensive technology use by political activists during the Sudanese revolution A Daffalla, L Simko, T Kohno, AG Bardas 2021 IEEE symposium on security and privacy (SP), 372-390, 2021 | 48 | 2021 |
Recognizing and imitating programmer style: Adversaries in program authorship attribution L Simko, L Zettlemoyer, T Kohno Proceedings on Privacy Enhancing Technologies, 2018 | 44 | 2018 |
A study of usage-based navigation models and generated abstract test cases for web applications S Sprenkle, L Pollock, L Simko 2011 Fourth IEEE International Conference on Software Testing, Verification …, 2011 | 38 | 2011 |
Configuring effective navigation models and abstract test cases for web applications by analysing user behaviour SE Sprenkle, LL Pollock, LM Simko Software Testing, Verification and Reliability 23 (6), 439-464, 2013 | 27 | 2013 |
Technology-enabled disinformation: Summary, lessons, and recommendations J Akers, G Bansal, G Cadamuro, C Chen, Q Chen, L Lin, P Mulcaire, ... arXiv preprint arXiv:1812.09383, 2018 | 26 | 2018 |
User experiences with online status indicators C Cobb, L Simko, T Kohno, A Hiniker Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 18* | 2020 |
Would you rather: A focus group method for eliciting and discussing formative design insights with children L Simko, B Chin, S Na, HK Saluja, TQ Zhu, T Kohno, A Hiniker, J Yip, ... Proceedings of the 20th Annual ACM Interaction Design and Children …, 2021 | 14 | 2021 |
" We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments S Amft, S Höltervennhoff, N Huaman, A Krause, L Simko, Y Acar, S Fahl Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 12* | 2023 |
Technology-enabled disinformation: summary, lessons J Akers, G Bansal, G Cadamuro, C Chen, Q Chen, L Lin, P Mulcaire, ... and Recommendations, Technical Report UW-CSE, 21 December 2018. Available at …, 2018 | 7 | 2018 |
A Privacy-Focused Systematic Analysis of Online Status Indicators C Cobb, L Simko, T Kohno, A Hiniker Proceedings on Privacy Enhancing Technologies, 2020 | 5 | 2020 |
Humans and Vulnerability During Times of Change: Computer Security Needs, Practices, Challenges, and Opportunities L Simko University of Washington, 2022 | 4 | 2022 |
Defensive Technology Use During the 2018-2019 Sudanese Revolution A Daffalla, L Simko, T Kohno, AG Bardas IEEE Security & Privacy 20 (2), 40-48, 2021 | 4 | 2021 |
COVID-19 contact tracing and privacy: studying opinion and preferences. arXiv L Simko, R Calo, F Roesner, T Kohno Preprint posted online on May 12, 2020 | 4 | 2020 |
Security, privacy, and data-sharing trade-offs when moving to the united states: Insights from a qualitative study M Tran, CW Munyendo, HS Ramulu, RG Rodriguez, LB Schnell, C Sula, ... 2024 IEEE Symposium on Security and Privacy (SP), 617-634, 2024 | 2 | 2024 |
" But they have overlooked a few things in {Afghanistan:}" An Analysis of the Integration of Biometric Voter Verification in the 2019 Afghan Presidential Elections K Panahi, S Robertson, Y Acar, AG Bardas, T Kohno, L Simko 33rd USENIX Security Symposium (USENIX Security 24), 2047-2064, 2024 | 1 | 2024 |
The Use and Non-Use of Technology During Hurricanes L Simko, H Sri Ramulu, T Kohno, Y Acar Proceedings of the ACM on Human-Computer Interaction 7 (CSCW2), 1-54, 2023 | 1 | 2023 |
Beyond “Vulnerable Populations”: A Unified Understanding of Vulnerability From A Socio-Ecological Perspective X TANG, G LIMA, LI JIANG, L SIMKO, Y ZOU Proc. ACM Hum.-Comput. Interact 1 (1), 2025 | | 2025 |